Add ability to configure auth backends and classes #1397
ci.yml
on: pull_request
Puppet
/
Static validations
24s
Matrix: Puppet / acceptance
Matrix: Puppet / unit
Puppet
/
Test suite
0s
Annotations
28 errors
Puppet / Puppet 7 - CentOS 8 - Pulp nightly
Process completed with exit code 1.
|
Puppet / Puppet 8 - CentOS 8 - Pulp nightly
Process completed with exit code 1.
|
Puppet / Puppet 8 - CentOS 8 - Pulp 3.39
Process completed with exit code 1.
|
Puppet / Puppet 7 - CentOS 8 - Pulp 3.39
Process completed with exit code 1.
|
Puppet / Puppet 8 - AlmaLinux 9 - Pulp 3.39:
spec/acceptance/settings_spec.rb#L102
AUTHENTICATION_BACKENDS setting default AUTHENTICATION_BACKENDS File "/etc/pulp/settings.py" content is expected to match /^AUTHENTICATION_BACKENDS = \['pulpcore.app.authentication.PulpNoCreateRemoteUserBackend'\]$/
Failure/Error: its(:content) { is_expected.to match(/^AUTHENTICATION_BACKENDS = \['pulpcore.app.authentication.PulpNoCreateRemoteUserBackend'\]$/) }
expected "################################################################################\n# File managed by ...nsole'],\n 'level': 'WARNING',\n 'propagate': False,\n },\n },\n}\n" to match /^AUTHENTICATION_BACKENDS = \['pulpcore.app.authentication.PulpNoCreateRemoteUserBackend'\]$/
Diff:
@@ -1,75 +1,149 @@
-/^AUTHENTICATION_BACKENDS = \['pulpcore.app.authentication.PulpNoCreateRemoteUserBackend'\]$/
+################################################################################
+# File managed by Puppet module: pulpcore
+################################################################################
+# Not only will edits be overwritten later, there is also a strong
+# possibility of breaking the system if changes are made here without making
+# required corresponding changes elsewhere. Refer to the documentation used to
+# install Pulpcore to determine the safe and persistent way to modify the
+# configuration.
+################################################################################
+
+# Send anonymous usage data to https://analytics.pulpproject.org/ unless this is
+# explicitly defined with value False. This data is used by the Pulp project
+# to make informed, data-driven decisions about future feature development.
+# ANALYTICS = False
+
+CONTENT_ORIGIN = "https://almalinux9-64-puppet8.example.com"
+SECRET_KEY = "CKRZupZ2TiqdS6JiChWMbCLHpifgTUSqMfdTeARNP7xoQ9XkQU"
+DATABASES = {
+ 'default': {
+ 'ENGINE': 'django.db.backends.postgresql',
+ 'NAME': 'pulpcore',
+ 'USER': 'pulp',
+ 'PASSWORD': 'aRSV7fqsGyHoP9hY9phaD9R8MC5eJEKw',
+ 'HOST': 'localhost',
+ 'PORT': '5432',
+ },
+}
+REDIS_URL = "redis://localhost:6379/8"
+
+
+MEDIA_ROOT = "/var/lib/pulp/media"
+STATIC_ROOT = "/var/lib/pulp/assets"
+STATIC_URL = "/assets/"
+FILE_UPLOAD_TEMP_DIR = "/var/lib/pulp/tmp"
+WORKING_DIRECTORY = "/var/lib/pulp/tmp"
+
+REMOTE_USER_ENVIRON_NAME = 'HTTP_REMOTE_USER'
+AUTHENTICATION_BACKENDS = ["pulpcore.app.authentication.PulpNoCreateRemoteUserBackend"]
+
+REST_FRAMEWORK__DEFAULT_AUTHENTICATION_CLASSES = (
+ 'rest_framework.authentication.SessionAuthentication',
+ 'pulpcore.app.authentication.PulpRemoteUserAuthentication',
+)
+
+ALLOWED_IMPORT_PATHS = ["/var/lib/pulp/sync_imports"]
+ALLOWED_EXPORT_PATHS = []
+ALLOWED_CONTENT_CHECKSUMS = ["sha224", "sha256", "sha384", "sha512"]
+
+# Derive HTTP/HTTPS via the X-Forwarded-Proto header set by Apache
+SECURE_PROXY_SSL_HEADER = ('HTTP_X_FORWARDED_PROTO', 'https')
+
+CACHE_ENABLED = False
+
+# HIDE_GUARDED_DISTRIBUTIONS = False
+
+# IMPORT_WORKERS_PERCENT = 100
+LOGGING = {
+ "dynaconf_merge": True,
+ "loggers": {
+ '': {
+ 'handlers': ['console'],
+ 'level': 'INFO',
+ },
+ 'pulpcore.deprecation': {
+ 'handlers': ['console'],
+ 'level': 'ERROR',
+ 'propagate': False,
+ },
+ 'django_guid': {
+ 'handlers': ['console'],
+ 'level': 'WARNING',
+ 'propagate': False,
+ },
+ },
+}
|
Puppet / Puppet 8 - AlmaLinux 9 - Pulp 3.39
Process completed with exit code 1.
|
Puppet / Puppet 7 - AlmaLinux 9 - Pulp 3.39:
spec/acceptance/settings_spec.rb#L102
AUTHENTICATION_BACKENDS setting default AUTHENTICATION_BACKENDS File "/etc/pulp/settings.py" content is expected to match /^AUTHENTICATION_BACKENDS = \['pulpcore.app.authentication.PulpNoCreateRemoteUserBackend'\]$/
Failure/Error: its(:content) { is_expected.to match(/^AUTHENTICATION_BACKENDS = \['pulpcore.app.authentication.PulpNoCreateRemoteUserBackend'\]$/) }
expected "################################################################################\n# File managed by ...nsole'],\n 'level': 'WARNING',\n 'propagate': False,\n },\n },\n}\n" to match /^AUTHENTICATION_BACKENDS = \['pulpcore.app.authentication.PulpNoCreateRemoteUserBackend'\]$/
Diff:
@@ -1,75 +1,149 @@
-/^AUTHENTICATION_BACKENDS = \['pulpcore.app.authentication.PulpNoCreateRemoteUserBackend'\]$/
+################################################################################
+# File managed by Puppet module: pulpcore
+################################################################################
+# Not only will edits be overwritten later, there is also a strong
+# possibility of breaking the system if changes are made here without making
+# required corresponding changes elsewhere. Refer to the documentation used to
+# install Pulpcore to determine the safe and persistent way to modify the
+# configuration.
+################################################################################
+
+# Send anonymous usage data to https://analytics.pulpproject.org/ unless this is
+# explicitly defined with value False. This data is used by the Pulp project
+# to make informed, data-driven decisions about future feature development.
+# ANALYTICS = False
+
+CONTENT_ORIGIN = "https://almalinux9-64-puppet7.example.com"
+SECRET_KEY = "qBjzvchVrNP8zc6ahrfkVt3jTBxwLrTNfhi6AoxjnpEWSVmNGe"
+DATABASES = {
+ 'default': {
+ 'ENGINE': 'django.db.backends.postgresql',
+ 'NAME': 'pulpcore',
+ 'USER': 'pulp',
+ 'PASSWORD': '8wFEQVhC7BjwX3oMNychmg2gZGNGPyKW',
+ 'HOST': 'localhost',
+ 'PORT': '5432',
+ },
+}
+REDIS_URL = "redis://localhost:6379/8"
+
+
+MEDIA_ROOT = "/var/lib/pulp/media"
+STATIC_ROOT = "/var/lib/pulp/assets"
+STATIC_URL = "/assets/"
+FILE_UPLOAD_TEMP_DIR = "/var/lib/pulp/tmp"
+WORKING_DIRECTORY = "/var/lib/pulp/tmp"
+
+REMOTE_USER_ENVIRON_NAME = 'HTTP_REMOTE_USER'
+AUTHENTICATION_BACKENDS = ["pulpcore.app.authentication.PulpNoCreateRemoteUserBackend"]
+
+REST_FRAMEWORK__DEFAULT_AUTHENTICATION_CLASSES = (
+ 'rest_framework.authentication.SessionAuthentication',
+ 'pulpcore.app.authentication.PulpRemoteUserAuthentication',
+)
+
+ALLOWED_IMPORT_PATHS = ["/var/lib/pulp/sync_imports"]
+ALLOWED_EXPORT_PATHS = []
+ALLOWED_CONTENT_CHECKSUMS = ["sha224", "sha256", "sha384", "sha512"]
+
+# Derive HTTP/HTTPS via the X-Forwarded-Proto header set by Apache
+SECURE_PROXY_SSL_HEADER = ('HTTP_X_FORWARDED_PROTO', 'https')
+
+CACHE_ENABLED = False
+
+# HIDE_GUARDED_DISTRIBUTIONS = False
+
+# IMPORT_WORKERS_PERCENT = 100
+LOGGING = {
+ "dynaconf_merge": True,
+ "loggers": {
+ '': {
+ 'handlers': ['console'],
+ 'level': 'INFO',
+ },
+ 'pulpcore.deprecation': {
+ 'handlers': ['console'],
+ 'level': 'ERROR',
+ 'propagate': False,
+ },
+ 'django_guid': {
+ 'handlers': ['console'],
+ 'level': 'WARNING',
+ 'propagate': False,
+ },
+ },
+}
|
Puppet / Puppet 7 - AlmaLinux 9 - Pulp 3.39
Process completed with exit code 1.
|
Puppet / Puppet 7 - AlmaLinux 8 - Pulp 3.39:
spec/acceptance/settings_spec.rb#L102
AUTHENTICATION_BACKENDS setting default AUTHENTICATION_BACKENDS File "/etc/pulp/settings.py" content is expected to match /^AUTHENTICATION_BACKENDS = \['pulpcore.app.authentication.PulpNoCreateRemoteUserBackend'\]$/
Failure/Error: its(:content) { is_expected.to match(/^AUTHENTICATION_BACKENDS = \['pulpcore.app.authentication.PulpNoCreateRemoteUserBackend'\]$/) }
expected "################################################################################\n# File managed by ...nsole'],\n 'level': 'WARNING',\n 'propagate': False,\n },\n },\n}\n" to match /^AUTHENTICATION_BACKENDS = \['pulpcore.app.authentication.PulpNoCreateRemoteUserBackend'\]$/
Diff:
@@ -1,75 +1,149 @@
-/^AUTHENTICATION_BACKENDS = \['pulpcore.app.authentication.PulpNoCreateRemoteUserBackend'\]$/
+################################################################################
+# File managed by Puppet module: pulpcore
+################################################################################
+# Not only will edits be overwritten later, there is also a strong
+# possibility of breaking the system if changes are made here without making
+# required corresponding changes elsewhere. Refer to the documentation used to
+# install Pulpcore to determine the safe and persistent way to modify the
+# configuration.
+################################################################################
+
+# Send anonymous usage data to https://analytics.pulpproject.org/ unless this is
+# explicitly defined with value False. This data is used by the Pulp project
+# to make informed, data-driven decisions about future feature development.
+# ANALYTICS = False
+
+CONTENT_ORIGIN = "https://almalinux8-64-puppet7.example.com"
+SECRET_KEY = "NmCTeVD6u6NKF4pZUy4hncDtbxJroGGkJXKNZfUpYYPLLhhEJw"
+DATABASES = {
+ 'default': {
+ 'ENGINE': 'django.db.backends.postgresql',
+ 'NAME': 'pulpcore',
+ 'USER': 'pulp',
+ 'PASSWORD': '3QJiemGsrtwYjoU5xkVXYZu6pWcUX8wi',
+ 'HOST': 'localhost',
+ 'PORT': '5432',
+ },
+}
+REDIS_URL = "redis://localhost:6379/8"
+
+
+MEDIA_ROOT = "/var/lib/pulp/media"
+STATIC_ROOT = "/var/lib/pulp/assets"
+STATIC_URL = "/assets/"
+FILE_UPLOAD_TEMP_DIR = "/var/lib/pulp/tmp"
+WORKING_DIRECTORY = "/var/lib/pulp/tmp"
+
+REMOTE_USER_ENVIRON_NAME = 'HTTP_REMOTE_USER'
+AUTHENTICATION_BACKENDS = ["pulpcore.app.authentication.PulpNoCreateRemoteUserBackend"]
+
+REST_FRAMEWORK__DEFAULT_AUTHENTICATION_CLASSES = (
+ 'rest_framework.authentication.SessionAuthentication',
+ 'pulpcore.app.authentication.PulpRemoteUserAuthentication',
+)
+
+ALLOWED_IMPORT_PATHS = ["/var/lib/pulp/sync_imports"]
+ALLOWED_EXPORT_PATHS = []
+ALLOWED_CONTENT_CHECKSUMS = ["sha224", "sha256", "sha384", "sha512"]
+
+# Derive HTTP/HTTPS via the X-Forwarded-Proto header set by Apache
+SECURE_PROXY_SSL_HEADER = ('HTTP_X_FORWARDED_PROTO', 'https')
+
+CACHE_ENABLED = False
+
+# HIDE_GUARDED_DISTRIBUTIONS = False
+
+# IMPORT_WORKERS_PERCENT = 100
+LOGGING = {
+ "dynaconf_merge": True,
+ "loggers": {
+ '': {
+ 'handlers': ['console'],
+ 'level': 'INFO',
+ },
+ 'pulpcore.deprecation': {
+ 'handlers': ['console'],
+ 'level': 'ERROR',
+ 'propagate': False,
+ },
+ 'django_guid': {
+ 'handlers': ['console'],
+ 'level': 'WARNING',
+ 'propagate': False,
+ },
+ },
+}
|
Puppet / Puppet 7 - AlmaLinux 8 - Pulp 3.39
Process completed with exit code 1.
|
Puppet / Puppet 8 - AlmaLinux 8 - Pulp 3.39:
spec/acceptance/settings_spec.rb#L102
AUTHENTICATION_BACKENDS setting default AUTHENTICATION_BACKENDS File "/etc/pulp/settings.py" content is expected to match /^AUTHENTICATION_BACKENDS = \['pulpcore.app.authentication.PulpNoCreateRemoteUserBackend'\]$/
Failure/Error: its(:content) { is_expected.to match(/^AUTHENTICATION_BACKENDS = \['pulpcore.app.authentication.PulpNoCreateRemoteUserBackend'\]$/) }
expected "################################################################################\n# File managed by ...nsole'],\n 'level': 'WARNING',\n 'propagate': False,\n },\n },\n}\n" to match /^AUTHENTICATION_BACKENDS = \['pulpcore.app.authentication.PulpNoCreateRemoteUserBackend'\]$/
Diff:
@@ -1,75 +1,149 @@
-/^AUTHENTICATION_BACKENDS = \['pulpcore.app.authentication.PulpNoCreateRemoteUserBackend'\]$/
+################################################################################
+# File managed by Puppet module: pulpcore
+################################################################################
+# Not only will edits be overwritten later, there is also a strong
+# possibility of breaking the system if changes are made here without making
+# required corresponding changes elsewhere. Refer to the documentation used to
+# install Pulpcore to determine the safe and persistent way to modify the
+# configuration.
+################################################################################
+
+# Send anonymous usage data to https://analytics.pulpproject.org/ unless this is
+# explicitly defined with value False. This data is used by the Pulp project
+# to make informed, data-driven decisions about future feature development.
+# ANALYTICS = False
+
+CONTENT_ORIGIN = "https://almalinux8-64-puppet8.example.com"
+SECRET_KEY = "FT3sFh27KjoPn7P2YUyGiudk852Cbz6c6Z4McCWHoRhuj4bvHa"
+DATABASES = {
+ 'default': {
+ 'ENGINE': 'django.db.backends.postgresql',
+ 'NAME': 'pulpcore',
+ 'USER': 'pulp',
+ 'PASSWORD': 'vL9ZkHMTQgHYXr9p3HKNRKqM64fjTGy3',
+ 'HOST': 'localhost',
+ 'PORT': '5432',
+ },
+}
+REDIS_URL = "redis://localhost:6379/8"
+
+
+MEDIA_ROOT = "/var/lib/pulp/media"
+STATIC_ROOT = "/var/lib/pulp/assets"
+STATIC_URL = "/assets/"
+FILE_UPLOAD_TEMP_DIR = "/var/lib/pulp/tmp"
+WORKING_DIRECTORY = "/var/lib/pulp/tmp"
+
+REMOTE_USER_ENVIRON_NAME = 'HTTP_REMOTE_USER'
+AUTHENTICATION_BACKENDS = ["pulpcore.app.authentication.PulpNoCreateRemoteUserBackend"]
+
+REST_FRAMEWORK__DEFAULT_AUTHENTICATION_CLASSES = (
+ 'rest_framework.authentication.SessionAuthentication',
+ 'pulpcore.app.authentication.PulpRemoteUserAuthentication',
+)
+
+ALLOWED_IMPORT_PATHS = ["/var/lib/pulp/sync_imports"]
+ALLOWED_EXPORT_PATHS = []
+ALLOWED_CONTENT_CHECKSUMS = ["sha224", "sha256", "sha384", "sha512"]
+
+# Derive HTTP/HTTPS via the X-Forwarded-Proto header set by Apache
+SECURE_PROXY_SSL_HEADER = ('HTTP_X_FORWARDED_PROTO', 'https')
+
+CACHE_ENABLED = False
+
+# HIDE_GUARDED_DISTRIBUTIONS = False
+
+# IMPORT_WORKERS_PERCENT = 100
+LOGGING = {
+ "dynaconf_merge": True,
+ "loggers": {
+ '': {
+ 'handlers': ['console'],
+ 'level': 'INFO',
+ },
+ 'pulpcore.deprecation': {
+ 'handlers': ['console'],
+ 'level': 'ERROR',
+ 'propagate': False,
+ },
+ 'django_guid': {
+ 'handlers': ['console'],
+ 'level': 'WARNING',
+ 'propagate': False,
+ },
+ },
+}
|
Puppet / Puppet 8 - AlmaLinux 8 - Pulp 3.39
Process completed with exit code 1.
|
Puppet / Puppet 8 - CentOS 9 - Pulp 3.39:
spec/acceptance/settings_spec.rb#L102
AUTHENTICATION_BACKENDS setting default AUTHENTICATION_BACKENDS File "/etc/pulp/settings.py" content is expected to match /^AUTHENTICATION_BACKENDS = \['pulpcore.app.authentication.PulpNoCreateRemoteUserBackend'\]$/
Failure/Error: its(:content) { is_expected.to match(/^AUTHENTICATION_BACKENDS = \['pulpcore.app.authentication.PulpNoCreateRemoteUserBackend'\]$/) }
expected "################################################################################\n# File managed by ...nsole'],\n 'level': 'WARNING',\n 'propagate': False,\n },\n },\n}\n" to match /^AUTHENTICATION_BACKENDS = \['pulpcore.app.authentication.PulpNoCreateRemoteUserBackend'\]$/
Diff:
@@ -1,75 +1,149 @@
-/^AUTHENTICATION_BACKENDS = \['pulpcore.app.authentication.PulpNoCreateRemoteUserBackend'\]$/
+################################################################################
+# File managed by Puppet module: pulpcore
+################################################################################
+# Not only will edits be overwritten later, there is also a strong
+# possibility of breaking the system if changes are made here without making
+# required corresponding changes elsewhere. Refer to the documentation used to
+# install Pulpcore to determine the safe and persistent way to modify the
+# configuration.
+################################################################################
+
+# Send anonymous usage data to https://analytics.pulpproject.org/ unless this is
+# explicitly defined with value False. This data is used by the Pulp project
+# to make informed, data-driven decisions about future feature development.
+# ANALYTICS = False
+
+CONTENT_ORIGIN = "https://centos9-64-puppet8.example.com"
+SECRET_KEY = "a4BZgDuBRz9i5L8K2ouTidxCTHPaNq9aBsq73TLdpLkSJJWhLT"
+DATABASES = {
+ 'default': {
+ 'ENGINE': 'django.db.backends.postgresql',
+ 'NAME': 'pulpcore',
+ 'USER': 'pulp',
+ 'PASSWORD': 'ug4p6m86smNoQXrincvgkuYariZExDiP',
+ 'HOST': 'localhost',
+ 'PORT': '5432',
+ },
+}
+REDIS_URL = "redis://localhost:6379/8"
+
+
+MEDIA_ROOT = "/var/lib/pulp/media"
+STATIC_ROOT = "/var/lib/pulp/assets"
+STATIC_URL = "/assets/"
+FILE_UPLOAD_TEMP_DIR = "/var/lib/pulp/tmp"
+WORKING_DIRECTORY = "/var/lib/pulp/tmp"
+
+REMOTE_USER_ENVIRON_NAME = 'HTTP_REMOTE_USER'
+AUTHENTICATION_BACKENDS = ["pulpcore.app.authentication.PulpNoCreateRemoteUserBackend"]
+
+REST_FRAMEWORK__DEFAULT_AUTHENTICATION_CLASSES = (
+ 'rest_framework.authentication.SessionAuthentication',
+ 'pulpcore.app.authentication.PulpRemoteUserAuthentication',
+)
+
+ALLOWED_IMPORT_PATHS = ["/var/lib/pulp/sync_imports"]
+ALLOWED_EXPORT_PATHS = []
+ALLOWED_CONTENT_CHECKSUMS = ["sha224", "sha256", "sha384", "sha512"]
+
+# Derive HTTP/HTTPS via the X-Forwarded-Proto header set by Apache
+SECURE_PROXY_SSL_HEADER = ('HTTP_X_FORWARDED_PROTO', 'https')
+
+CACHE_ENABLED = False
+
+# HIDE_GUARDED_DISTRIBUTIONS = False
+
+# IMPORT_WORKERS_PERCENT = 100
+LOGGING = {
+ "dynaconf_merge": True,
+ "loggers": {
+ '': {
+ 'handlers': ['console'],
+ 'level': 'INFO',
+ },
+ 'pulpcore.deprecation': {
+ 'handlers': ['console'],
+ 'level': 'ERROR',
+ 'propagate': False,
+ },
+ 'django_guid': {
+ 'handlers': ['console'],
+ 'level': 'WARNING',
+ 'propagate': False,
+ },
+ },
+}
|
Puppet / Puppet 8 - CentOS 9 - Pulp 3.39
Process completed with exit code 1.
|
Puppet / Puppet 7 - CentOS 9 - Pulp 3.39:
spec/acceptance/settings_spec.rb#L102
AUTHENTICATION_BACKENDS setting default AUTHENTICATION_BACKENDS File "/etc/pulp/settings.py" content is expected to match /^AUTHENTICATION_BACKENDS = \['pulpcore.app.authentication.PulpNoCreateRemoteUserBackend'\]$/
Failure/Error: its(:content) { is_expected.to match(/^AUTHENTICATION_BACKENDS = \['pulpcore.app.authentication.PulpNoCreateRemoteUserBackend'\]$/) }
expected "################################################################################\n# File managed by ...nsole'],\n 'level': 'WARNING',\n 'propagate': False,\n },\n },\n}\n" to match /^AUTHENTICATION_BACKENDS = \['pulpcore.app.authentication.PulpNoCreateRemoteUserBackend'\]$/
Diff:
@@ -1,75 +1,149 @@
-/^AUTHENTICATION_BACKENDS = \['pulpcore.app.authentication.PulpNoCreateRemoteUserBackend'\]$/
+################################################################################
+# File managed by Puppet module: pulpcore
+################################################################################
+# Not only will edits be overwritten later, there is also a strong
+# possibility of breaking the system if changes are made here without making
+# required corresponding changes elsewhere. Refer to the documentation used to
+# install Pulpcore to determine the safe and persistent way to modify the
+# configuration.
+################################################################################
+
+# Send anonymous usage data to https://analytics.pulpproject.org/ unless this is
+# explicitly defined with value False. This data is used by the Pulp project
+# to make informed, data-driven decisions about future feature development.
+# ANALYTICS = False
+
+CONTENT_ORIGIN = "https://centos9-64-puppet7.example.com"
+SECRET_KEY = "SbwcbsdtWHKKw4ZTHe9J842ZknXi7pCYB4kCHuCbKJpJwTm3Ab"
+DATABASES = {
+ 'default': {
+ 'ENGINE': 'django.db.backends.postgresql',
+ 'NAME': 'pulpcore',
+ 'USER': 'pulp',
+ 'PASSWORD': 'aKe9nhUQSqM857R82ZXbkZ2YuMZJ3yJD',
+ 'HOST': 'localhost',
+ 'PORT': '5432',
+ },
+}
+REDIS_URL = "redis://localhost:6379/8"
+
+
+MEDIA_ROOT = "/var/lib/pulp/media"
+STATIC_ROOT = "/var/lib/pulp/assets"
+STATIC_URL = "/assets/"
+FILE_UPLOAD_TEMP_DIR = "/var/lib/pulp/tmp"
+WORKING_DIRECTORY = "/var/lib/pulp/tmp"
+
+REMOTE_USER_ENVIRON_NAME = 'HTTP_REMOTE_USER'
+AUTHENTICATION_BACKENDS = ["pulpcore.app.authentication.PulpNoCreateRemoteUserBackend"]
+
+REST_FRAMEWORK__DEFAULT_AUTHENTICATION_CLASSES = (
+ 'rest_framework.authentication.SessionAuthentication',
+ 'pulpcore.app.authentication.PulpRemoteUserAuthentication',
+)
+
+ALLOWED_IMPORT_PATHS = ["/var/lib/pulp/sync_imports"]
+ALLOWED_EXPORT_PATHS = []
+ALLOWED_CONTENT_CHECKSUMS = ["sha224", "sha256", "sha384", "sha512"]
+
+# Derive HTTP/HTTPS via the X-Forwarded-Proto header set by Apache
+SECURE_PROXY_SSL_HEADER = ('HTTP_X_FORWARDED_PROTO', 'https')
+
+CACHE_ENABLED = False
+
+# HIDE_GUARDED_DISTRIBUTIONS = False
+
+# IMPORT_WORKERS_PERCENT = 100
+LOGGING = {
+ "dynaconf_merge": True,
+ "loggers": {
+ '': {
+ 'handlers': ['console'],
+ 'level': 'INFO',
+ },
+ 'pulpcore.deprecation': {
+ 'handlers': ['console'],
+ 'level': 'ERROR',
+ 'propagate': False,
+ },
+ 'django_guid': {
+ 'handlers': ['console'],
+ 'level': 'WARNING',
+ 'propagate': False,
+ },
+ },
+}
|
Puppet / Puppet 7 - CentOS 9 - Pulp 3.39
Process completed with exit code 1.
|
Puppet / Puppet 7 - AlmaLinux 9 - Pulp nightly:
spec/acceptance/settings_spec.rb#L102
AUTHENTICATION_BACKENDS setting default AUTHENTICATION_BACKENDS File "/etc/pulp/settings.py" content is expected to match /^AUTHENTICATION_BACKENDS = \['pulpcore.app.authentication.PulpNoCreateRemoteUserBackend'\]$/
Failure/Error: its(:content) { is_expected.to match(/^AUTHENTICATION_BACKENDS = \['pulpcore.app.authentication.PulpNoCreateRemoteUserBackend'\]$/) }
expected "################################################################################\n# File managed by ...nsole'],\n 'level': 'WARNING',\n 'propagate': False,\n },\n },\n}\n" to match /^AUTHENTICATION_BACKENDS = \['pulpcore.app.authentication.PulpNoCreateRemoteUserBackend'\]$/
Diff:
@@ -1,75 +1,149 @@
-/^AUTHENTICATION_BACKENDS = \['pulpcore.app.authentication.PulpNoCreateRemoteUserBackend'\]$/
+################################################################################
+# File managed by Puppet module: pulpcore
+################################################################################
+# Not only will edits be overwritten later, there is also a strong
+# possibility of breaking the system if changes are made here without making
+# required corresponding changes elsewhere. Refer to the documentation used to
+# install Pulpcore to determine the safe and persistent way to modify the
+# configuration.
+################################################################################
+
+# Send anonymous usage data to https://analytics.pulpproject.org/ unless this is
+# explicitly defined with value False. This data is used by the Pulp project
+# to make informed, data-driven decisions about future feature development.
+# ANALYTICS = False
+
+CONTENT_ORIGIN = "https://almalinux9-64-puppet7.example.com"
+SECRET_KEY = "Zc4XPRxFtfPUFopsZxXL4BhekX7JdEMLseYUL4kDuRhhqduivk"
+DATABASES = {
+ 'default': {
+ 'ENGINE': 'django.db.backends.postgresql',
+ 'NAME': 'pulpcore',
+ 'USER': 'pulp',
+ 'PASSWORD': 'px9UYBriUyvt2MM7vNdUJbUWFzjSWWCe',
+ 'HOST': 'localhost',
+ 'PORT': '5432',
+ },
+}
+REDIS_URL = "redis://localhost:6379/8"
+
+
+MEDIA_ROOT = "/var/lib/pulp/media"
+STATIC_ROOT = "/var/lib/pulp/assets"
+STATIC_URL = "/assets/"
+FILE_UPLOAD_TEMP_DIR = "/var/lib/pulp/tmp"
+WORKING_DIRECTORY = "/var/lib/pulp/tmp"
+
+REMOTE_USER_ENVIRON_NAME = 'HTTP_REMOTE_USER'
+AUTHENTICATION_BACKENDS = ["pulpcore.app.authentication.PulpNoCreateRemoteUserBackend"]
+
+REST_FRAMEWORK__DEFAULT_AUTHENTICATION_CLASSES = (
+ 'rest_framework.authentication.SessionAuthentication',
+ 'pulpcore.app.authentication.PulpRemoteUserAuthentication',
+)
+
+ALLOWED_IMPORT_PATHS = ["/var/lib/pulp/sync_imports"]
+ALLOWED_EXPORT_PATHS = []
+ALLOWED_CONTENT_CHECKSUMS = ["sha224", "sha256", "sha384", "sha512"]
+
+# Derive HTTP/HTTPS via the X-Forwarded-Proto header set by Apache
+SECURE_PROXY_SSL_HEADER = ('HTTP_X_FORWARDED_PROTO', 'https')
+
+CACHE_ENABLED = False
+
+# HIDE_GUARDED_DISTRIBUTIONS = False
+
+# IMPORT_WORKERS_PERCENT = 100
+LOGGING = {
+ "dynaconf_merge": True,
+ "loggers": {
+ '': {
+ 'handlers': ['console'],
+ 'level': 'INFO',
+ },
+ 'pulpcore.deprecation': {
+ 'handlers': ['console'],
+ 'level': 'ERROR',
+ 'propagate': False,
+ },
+ 'django_guid': {
+ 'handlers': ['console'],
+ 'level': 'WARNING',
+ 'propagate': False,
+ },
+ },
+}
|
Puppet / Puppet 7 - AlmaLinux 9 - Pulp nightly
Process completed with exit code 1.
|
Puppet / Puppet 7 - CentOS 9 - Pulp nightly:
spec/acceptance/settings_spec.rb#L102
AUTHENTICATION_BACKENDS setting default AUTHENTICATION_BACKENDS File "/etc/pulp/settings.py" content is expected to match /^AUTHENTICATION_BACKENDS = \['pulpcore.app.authentication.PulpNoCreateRemoteUserBackend'\]$/
Failure/Error: its(:content) { is_expected.to match(/^AUTHENTICATION_BACKENDS = \['pulpcore.app.authentication.PulpNoCreateRemoteUserBackend'\]$/) }
expected "################################################################################\n# File managed by ...nsole'],\n 'level': 'WARNING',\n 'propagate': False,\n },\n },\n}\n" to match /^AUTHENTICATION_BACKENDS = \['pulpcore.app.authentication.PulpNoCreateRemoteUserBackend'\]$/
Diff:
@@ -1,75 +1,149 @@
-/^AUTHENTICATION_BACKENDS = \['pulpcore.app.authentication.PulpNoCreateRemoteUserBackend'\]$/
+################################################################################
+# File managed by Puppet module: pulpcore
+################################################################################
+# Not only will edits be overwritten later, there is also a strong
+# possibility of breaking the system if changes are made here without making
+# required corresponding changes elsewhere. Refer to the documentation used to
+# install Pulpcore to determine the safe and persistent way to modify the
+# configuration.
+################################################################################
+
+# Send anonymous usage data to https://analytics.pulpproject.org/ unless this is
+# explicitly defined with value False. This data is used by the Pulp project
+# to make informed, data-driven decisions about future feature development.
+# ANALYTICS = False
+
+CONTENT_ORIGIN = "https://centos9-64-puppet7.example.com"
+SECRET_KEY = "AnRqj4pgEbwhn6xya4AanZCeHQfz94EYyY9yqTDQFePAqC98Rk"
+DATABASES = {
+ 'default': {
+ 'ENGINE': 'django.db.backends.postgresql',
+ 'NAME': 'pulpcore',
+ 'USER': 'pulp',
+ 'PASSWORD': 'j9YPMkMbbAmmf8s7kb4PmASZkourxjr7',
+ 'HOST': 'localhost',
+ 'PORT': '5432',
+ },
+}
+REDIS_URL = "redis://localhost:6379/8"
+
+
+MEDIA_ROOT = "/var/lib/pulp/media"
+STATIC_ROOT = "/var/lib/pulp/assets"
+STATIC_URL = "/assets/"
+FILE_UPLOAD_TEMP_DIR = "/var/lib/pulp/tmp"
+WORKING_DIRECTORY = "/var/lib/pulp/tmp"
+
+REMOTE_USER_ENVIRON_NAME = 'HTTP_REMOTE_USER'
+AUTHENTICATION_BACKENDS = ["pulpcore.app.authentication.PulpNoCreateRemoteUserBackend"]
+
+REST_FRAMEWORK__DEFAULT_AUTHENTICATION_CLASSES = (
+ 'rest_framework.authentication.SessionAuthentication',
+ 'pulpcore.app.authentication.PulpRemoteUserAuthentication',
+)
+
+ALLOWED_IMPORT_PATHS = ["/var/lib/pulp/sync_imports"]
+ALLOWED_EXPORT_PATHS = []
+ALLOWED_CONTENT_CHECKSUMS = ["sha224", "sha256", "sha384", "sha512"]
+
+# Derive HTTP/HTTPS via the X-Forwarded-Proto header set by Apache
+SECURE_PROXY_SSL_HEADER = ('HTTP_X_FORWARDED_PROTO', 'https')
+
+CACHE_ENABLED = False
+
+# HIDE_GUARDED_DISTRIBUTIONS = False
+
+# IMPORT_WORKERS_PERCENT = 100
+LOGGING = {
+ "dynaconf_merge": True,
+ "loggers": {
+ '': {
+ 'handlers': ['console'],
+ 'level': 'INFO',
+ },
+ 'pulpcore.deprecation': {
+ 'handlers': ['console'],
+ 'level': 'ERROR',
+ 'propagate': False,
+ },
+ 'django_guid': {
+ 'handlers': ['console'],
+ 'level': 'WARNING',
+ 'propagate': False,
+ },
+ },
+}
|
Puppet / Puppet 7 - CentOS 9 - Pulp nightly
Process completed with exit code 1.
|
Puppet / Puppet 8 - AlmaLinux 8 - Pulp nightly:
spec/acceptance/settings_spec.rb#L102
AUTHENTICATION_BACKENDS setting default AUTHENTICATION_BACKENDS File "/etc/pulp/settings.py" content is expected to match /^AUTHENTICATION_BACKENDS = \['pulpcore.app.authentication.PulpNoCreateRemoteUserBackend'\]$/
Failure/Error: its(:content) { is_expected.to match(/^AUTHENTICATION_BACKENDS = \['pulpcore.app.authentication.PulpNoCreateRemoteUserBackend'\]$/) }
expected "################################################################################\n# File managed by ...nsole'],\n 'level': 'WARNING',\n 'propagate': False,\n },\n },\n}\n" to match /^AUTHENTICATION_BACKENDS = \['pulpcore.app.authentication.PulpNoCreateRemoteUserBackend'\]$/
Diff:
@@ -1,75 +1,149 @@
-/^AUTHENTICATION_BACKENDS = \['pulpcore.app.authentication.PulpNoCreateRemoteUserBackend'\]$/
+################################################################################
+# File managed by Puppet module: pulpcore
+################################################################################
+# Not only will edits be overwritten later, there is also a strong
+# possibility of breaking the system if changes are made here without making
+# required corresponding changes elsewhere. Refer to the documentation used to
+# install Pulpcore to determine the safe and persistent way to modify the
+# configuration.
+################################################################################
+
+# Send anonymous usage data to https://analytics.pulpproject.org/ unless this is
+# explicitly defined with value False. This data is used by the Pulp project
+# to make informed, data-driven decisions about future feature development.
+# ANALYTICS = False
+
+CONTENT_ORIGIN = "https://almalinux8-64-puppet8.example.com"
+SECRET_KEY = "RCbS3C9qPzLeXkkCCFDUqGWsVw7YD47KMzoNCjx8Q4a8v36xNf"
+DATABASES = {
+ 'default': {
+ 'ENGINE': 'django.db.backends.postgresql',
+ 'NAME': 'pulpcore',
+ 'USER': 'pulp',
+ 'PASSWORD': 'boo9abDJ3LQzG7mD27faFSLVaHK8Pfp5',
+ 'HOST': 'localhost',
+ 'PORT': '5432',
+ },
+}
+REDIS_URL = "redis://localhost:6379/8"
+
+
+MEDIA_ROOT = "/var/lib/pulp/media"
+STATIC_ROOT = "/var/lib/pulp/assets"
+STATIC_URL = "/assets/"
+FILE_UPLOAD_TEMP_DIR = "/var/lib/pulp/tmp"
+WORKING_DIRECTORY = "/var/lib/pulp/tmp"
+
+REMOTE_USER_ENVIRON_NAME = 'HTTP_REMOTE_USER'
+AUTHENTICATION_BACKENDS = ["pulpcore.app.authentication.PulpNoCreateRemoteUserBackend"]
+
+REST_FRAMEWORK__DEFAULT_AUTHENTICATION_CLASSES = (
+ 'rest_framework.authentication.SessionAuthentication',
+ 'pulpcore.app.authentication.PulpRemoteUserAuthentication',
+)
+
+ALLOWED_IMPORT_PATHS = ["/var/lib/pulp/sync_imports"]
+ALLOWED_EXPORT_PATHS = []
+ALLOWED_CONTENT_CHECKSUMS = ["sha224", "sha256", "sha384", "sha512"]
+
+# Derive HTTP/HTTPS via the X-Forwarded-Proto header set by Apache
+SECURE_PROXY_SSL_HEADER = ('HTTP_X_FORWARDED_PROTO', 'https')
+
+CACHE_ENABLED = False
+
+# HIDE_GUARDED_DISTRIBUTIONS = False
+
+# IMPORT_WORKERS_PERCENT = 100
+LOGGING = {
+ "dynaconf_merge": True,
+ "loggers": {
+ '': {
+ 'handlers': ['console'],
+ 'level': 'INFO',
+ },
+ 'pulpcore.deprecation': {
+ 'handlers': ['console'],
+ 'level': 'ERROR',
+ 'propagate': False,
+ },
+ 'django_guid': {
+ 'handlers': ['console'],
+ 'level': 'WARNING',
+ 'propagate': False,
+ },
+ },
+}
|
Puppet / Puppet 8 - AlmaLinux 8 - Pulp nightly
Process completed with exit code 1.
|
Puppet / Puppet 7 - AlmaLinux 8 - Pulp nightly:
spec/acceptance/settings_spec.rb#L102
AUTHENTICATION_BACKENDS setting default AUTHENTICATION_BACKENDS File "/etc/pulp/settings.py" content is expected to match /^AUTHENTICATION_BACKENDS = \['pulpcore.app.authentication.PulpNoCreateRemoteUserBackend'\]$/
Failure/Error: its(:content) { is_expected.to match(/^AUTHENTICATION_BACKENDS = \['pulpcore.app.authentication.PulpNoCreateRemoteUserBackend'\]$/) }
expected "################################################################################\n# File managed by ...nsole'],\n 'level': 'WARNING',\n 'propagate': False,\n },\n },\n}\n" to match /^AUTHENTICATION_BACKENDS = \['pulpcore.app.authentication.PulpNoCreateRemoteUserBackend'\]$/
Diff:
@@ -1,75 +1,149 @@
-/^AUTHENTICATION_BACKENDS = \['pulpcore.app.authentication.PulpNoCreateRemoteUserBackend'\]$/
+################################################################################
+# File managed by Puppet module: pulpcore
+################################################################################
+# Not only will edits be overwritten later, there is also a strong
+# possibility of breaking the system if changes are made here without making
+# required corresponding changes elsewhere. Refer to the documentation used to
+# install Pulpcore to determine the safe and persistent way to modify the
+# configuration.
+################################################################################
+
+# Send anonymous usage data to https://analytics.pulpproject.org/ unless this is
+# explicitly defined with value False. This data is used by the Pulp project
+# to make informed, data-driven decisions about future feature development.
+# ANALYTICS = False
+
+CONTENT_ORIGIN = "https://almalinux8-64-puppet7.example.com"
+SECRET_KEY = "Zncz4HKSdquruuZtiP2uprBmQP72VFB2BGxWhLM2hqDSZpUcxh"
+DATABASES = {
+ 'default': {
+ 'ENGINE': 'django.db.backends.postgresql',
+ 'NAME': 'pulpcore',
+ 'USER': 'pulp',
+ 'PASSWORD': '8Kp4K7WGxmS6RcD8qQWw6ei75nncEvmM',
+ 'HOST': 'localhost',
+ 'PORT': '5432',
+ },
+}
+REDIS_URL = "redis://localhost:6379/8"
+
+
+MEDIA_ROOT = "/var/lib/pulp/media"
+STATIC_ROOT = "/var/lib/pulp/assets"
+STATIC_URL = "/assets/"
+FILE_UPLOAD_TEMP_DIR = "/var/lib/pulp/tmp"
+WORKING_DIRECTORY = "/var/lib/pulp/tmp"
+
+REMOTE_USER_ENVIRON_NAME = 'HTTP_REMOTE_USER'
+AUTHENTICATION_BACKENDS = ["pulpcore.app.authentication.PulpNoCreateRemoteUserBackend"]
+
+REST_FRAMEWORK__DEFAULT_AUTHENTICATION_CLASSES = (
+ 'rest_framework.authentication.SessionAuthentication',
+ 'pulpcore.app.authentication.PulpRemoteUserAuthentication',
+)
+
+ALLOWED_IMPORT_PATHS = ["/var/lib/pulp/sync_imports"]
+ALLOWED_EXPORT_PATHS = []
+ALLOWED_CONTENT_CHECKSUMS = ["sha224", "sha256", "sha384", "sha512"]
+
+# Derive HTTP/HTTPS via the X-Forwarded-Proto header set by Apache
+SECURE_PROXY_SSL_HEADER = ('HTTP_X_FORWARDED_PROTO', 'https')
+
+CACHE_ENABLED = False
+
+# HIDE_GUARDED_DISTRIBUTIONS = False
+
+# IMPORT_WORKERS_PERCENT = 100
+LOGGING = {
+ "dynaconf_merge": True,
+ "loggers": {
+ '': {
+ 'handlers': ['console'],
+ 'level': 'INFO',
+ },
+ 'pulpcore.deprecation': {
+ 'handlers': ['console'],
+ 'level': 'ERROR',
+ 'propagate': False,
+ },
+ 'django_guid': {
+ 'handlers': ['console'],
+ 'level': 'WARNING',
+ 'propagate': False,
+ },
+ },
+}
|
Puppet / Puppet 7 - AlmaLinux 8 - Pulp nightly
Process completed with exit code 1.
|
Puppet / Puppet 8 - CentOS 9 - Pulp nightly:
spec/acceptance/settings_spec.rb#L102
AUTHENTICATION_BACKENDS setting default AUTHENTICATION_BACKENDS File "/etc/pulp/settings.py" content is expected to match /^AUTHENTICATION_BACKENDS = \['pulpcore.app.authentication.PulpNoCreateRemoteUserBackend'\]$/
Failure/Error: its(:content) { is_expected.to match(/^AUTHENTICATION_BACKENDS = \['pulpcore.app.authentication.PulpNoCreateRemoteUserBackend'\]$/) }
expected "################################################################################\n# File managed by ...nsole'],\n 'level': 'WARNING',\n 'propagate': False,\n },\n },\n}\n" to match /^AUTHENTICATION_BACKENDS = \['pulpcore.app.authentication.PulpNoCreateRemoteUserBackend'\]$/
Diff:
@@ -1,75 +1,149 @@
-/^AUTHENTICATION_BACKENDS = \['pulpcore.app.authentication.PulpNoCreateRemoteUserBackend'\]$/
+################################################################################
+# File managed by Puppet module: pulpcore
+################################################################################
+# Not only will edits be overwritten later, there is also a strong
+# possibility of breaking the system if changes are made here without making
+# required corresponding changes elsewhere. Refer to the documentation used to
+# install Pulpcore to determine the safe and persistent way to modify the
+# configuration.
+################################################################################
+
+# Send anonymous usage data to https://analytics.pulpproject.org/ unless this is
+# explicitly defined with value False. This data is used by the Pulp project
+# to make informed, data-driven decisions about future feature development.
+# ANALYTICS = False
+
+CONTENT_ORIGIN = "https://centos9-64-puppet8.example.com"
+SECRET_KEY = "gW37BasMf7np84scUSRpVpJJMtbXJ5LiyeMgRpp82grcdGSScj"
+DATABASES = {
+ 'default': {
+ 'ENGINE': 'django.db.backends.postgresql',
+ 'NAME': 'pulpcore',
+ 'USER': 'pulp',
+ 'PASSWORD': 'KVWuhb9C39cAjgxW4YsMhT76oqCDmhNp',
+ 'HOST': 'localhost',
+ 'PORT': '5432',
+ },
+}
+REDIS_URL = "redis://localhost:6379/8"
+
+
+MEDIA_ROOT = "/var/lib/pulp/media"
+STATIC_ROOT = "/var/lib/pulp/assets"
+STATIC_URL = "/assets/"
+FILE_UPLOAD_TEMP_DIR = "/var/lib/pulp/tmp"
+WORKING_DIRECTORY = "/var/lib/pulp/tmp"
+
+REMOTE_USER_ENVIRON_NAME = 'HTTP_REMOTE_USER'
+AUTHENTICATION_BACKENDS = ["pulpcore.app.authentication.PulpNoCreateRemoteUserBackend"]
+
+REST_FRAMEWORK__DEFAULT_AUTHENTICATION_CLASSES = (
+ 'rest_framework.authentication.SessionAuthentication',
+ 'pulpcore.app.authentication.PulpRemoteUserAuthentication',
+)
+
+ALLOWED_IMPORT_PATHS = ["/var/lib/pulp/sync_imports"]
+ALLOWED_EXPORT_PATHS = []
+ALLOWED_CONTENT_CHECKSUMS = ["sha224", "sha256", "sha384", "sha512"]
+
+# Derive HTTP/HTTPS via the X-Forwarded-Proto header set by Apache
+SECURE_PROXY_SSL_HEADER = ('HTTP_X_FORWARDED_PROTO', 'https')
+
+CACHE_ENABLED = False
+
+# HIDE_GUARDED_DISTRIBUTIONS = False
+
+# IMPORT_WORKERS_PERCENT = 100
+LOGGING = {
+ "dynaconf_merge": True,
+ "loggers": {
+ '': {
+ 'handlers': ['console'],
+ 'level': 'INFO',
+ },
+ 'pulpcore.deprecation': {
+ 'handlers': ['console'],
+ 'level': 'ERROR',
+ 'propagate': False,
+ },
+ 'django_guid': {
+ 'handlers': ['console'],
+ 'level': 'WARNING',
+ 'propagate': False,
+ },
+ },
+}
|
Puppet / Puppet 8 - CentOS 9 - Pulp nightly
Process completed with exit code 1.
|
Puppet / Puppet 8 - AlmaLinux 9 - Pulp nightly:
spec/acceptance/settings_spec.rb#L102
AUTHENTICATION_BACKENDS setting default AUTHENTICATION_BACKENDS File "/etc/pulp/settings.py" content is expected to match /^AUTHENTICATION_BACKENDS = \['pulpcore.app.authentication.PulpNoCreateRemoteUserBackend'\]$/
Failure/Error: its(:content) { is_expected.to match(/^AUTHENTICATION_BACKENDS = \['pulpcore.app.authentication.PulpNoCreateRemoteUserBackend'\]$/) }
expected "################################################################################\n# File managed by ...nsole'],\n 'level': 'WARNING',\n 'propagate': False,\n },\n },\n}\n" to match /^AUTHENTICATION_BACKENDS = \['pulpcore.app.authentication.PulpNoCreateRemoteUserBackend'\]$/
Diff:
@@ -1,75 +1,149 @@
-/^AUTHENTICATION_BACKENDS = \['pulpcore.app.authentication.PulpNoCreateRemoteUserBackend'\]$/
+################################################################################
+# File managed by Puppet module: pulpcore
+################################################################################
+# Not only will edits be overwritten later, there is also a strong
+# possibility of breaking the system if changes are made here without making
+# required corresponding changes elsewhere. Refer to the documentation used to
+# install Pulpcore to determine the safe and persistent way to modify the
+# configuration.
+################################################################################
+
+# Send anonymous usage data to https://analytics.pulpproject.org/ unless this is
+# explicitly defined with value False. This data is used by the Pulp project
+# to make informed, data-driven decisions about future feature development.
+# ANALYTICS = False
+
+CONTENT_ORIGIN = "https://almalinux9-64-puppet8.example.com"
+SECRET_KEY = "MoXeg7RZPT8sCdvedg5ASnLSuX4kjTAztvVoLFBEerVNvwedBM"
+DATABASES = {
+ 'default': {
+ 'ENGINE': 'django.db.backends.postgresql',
+ 'NAME': 'pulpcore',
+ 'USER': 'pulp',
+ 'PASSWORD': '5DQZBCp7gw9PZCZubyBicgpMLCf6Wohz',
+ 'HOST': 'localhost',
+ 'PORT': '5432',
+ },
+}
+REDIS_URL = "redis://localhost:6379/8"
+
+
+MEDIA_ROOT = "/var/lib/pulp/media"
+STATIC_ROOT = "/var/lib/pulp/assets"
+STATIC_URL = "/assets/"
+FILE_UPLOAD_TEMP_DIR = "/var/lib/pulp/tmp"
+WORKING_DIRECTORY = "/var/lib/pulp/tmp"
+
+REMOTE_USER_ENVIRON_NAME = 'HTTP_REMOTE_USER'
+AUTHENTICATION_BACKENDS = ["pulpcore.app.authentication.PulpNoCreateRemoteUserBackend"]
+
+REST_FRAMEWORK__DEFAULT_AUTHENTICATION_CLASSES = (
+ 'rest_framework.authentication.SessionAuthentication',
+ 'pulpcore.app.authentication.PulpRemoteUserAuthentication',
+)
+
+ALLOWED_IMPORT_PATHS = ["/var/lib/pulp/sync_imports"]
+ALLOWED_EXPORT_PATHS = []
+ALLOWED_CONTENT_CHECKSUMS = ["sha224", "sha256", "sha384", "sha512"]
+
+# Derive HTTP/HTTPS via the X-Forwarded-Proto header set by Apache
+SECURE_PROXY_SSL_HEADER = ('HTTP_X_FORWARDED_PROTO', 'https')
+
+CACHE_ENABLED = False
+
+# HIDE_GUARDED_DISTRIBUTIONS = False
+
+# IMPORT_WORKERS_PERCENT = 100
+LOGGING = {
+ "dynaconf_merge": True,
+ "loggers": {
+ '': {
+ 'handlers': ['console'],
+ 'level': 'INFO',
+ },
+ 'pulpcore.deprecation': {
+ 'handlers': ['console'],
+ 'level': 'ERROR',
+ 'propagate': False,
+ },
+ 'django_guid': {
+ 'handlers': ['console'],
+ 'level': 'WARNING',
+ 'propagate': False,
+ },
+ },
+}
|
Puppet / Puppet 8 - AlmaLinux 9 - Pulp nightly
Process completed with exit code 1.
|